Most companies strive to analyze corporate data to improve the bottom line. But how many companies put the same time and effort into ensuring that corporate data is disposed of properly when it is no longer needed? Not nearly enough, according to a recent report from research firm Gartner Inc.

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

These are particularly egregious cases, and most large and midsized organizations have formal data-destruction policies in place, usually including data encryption, according to Jay Heiser, an analyst with Stamford, Conn.-based Gartner and the report's co-author. But encrypting data before discarding it is often not enough, Heiser said, and companies should develop comprehensive data destruction plans to ensure that data is disposed of appropriately.

Failure to do so could prove costly. Violating the bevy of regulatory and compliance rules enacted over the last decade for handling corporate and personal data, including the Health Insurance Portability and Accountability Act (HIPAA) and the Sarbanes-Oxley Act, can result in expensive lawsuits. In addition, a data breach can cause serious damage to the corporate brand.

"If you want to keep your company's name out of the newspaper for data leaks, data destruction is something you've got to ensure is being done carefully," Heiser said. "Just because you put your head in the sand doesn't mean the data isn't leaking out of your organization."

Reuse, recycle or destroy

In this age of global warming and green computing, pressure is mounting on organizations to reuse or recycle their computer hardware when possible. Overwriting -- replacing one set of data with another while still allowing the original data to be recovered -- is one method, Heiser said. Overwriting capabilities are built into nearly all hard drives, he said, but they can still leave traces of sensitive data.

"The trouble with normal overwriting is that it's slow and it's not actually 100% reliable, and [very often the data] can be recovered by a specialist lab," he said. "Normal overwriting is like trying to erase an Etch-A-Sketch. There's always something left behind."

A more effective form of overwriting, called Secure Erase, is a better option, Heiser said. Secure Erase capabilities began being built into hard drives in 2001, so it's not available on some older machines. "Secure Erase is a very fast, very secure form of overwriting that strongly resists any sort of laboratory, after-the-fact attempts to recover the data."

When reuse is not the goal, outright destruction of data sources -- rendering the data unreadable or otherwise useless -- is required. But destroying data sources is not as easy as it sounds, because hard drives and other magnetic media are extremely durable. "Data media usually contain large amounts of recoverable data, even after extensive impact, water or fire damage," Heiser writes in the report.

To destroy a data source adequately, organizations have two options, he said. The first is to expose magnetic data sources to a powerful magnetic field, obliterating any data it contains, a technique called
degaussing. Degaussing requires specialized equipment, however, and is not suitable for nonmagnetic data sources like CDs and DVDs.

The second option is the old-fashioned approach: physically destroying data sources. Physically destroying small data sources like CDs and DVDs in-house with a cross-cut shredder is easy enough, Heiser said. But destroying larger devices, including computer hard drives, often must be carried out by an outside contractor, such as a "licensed metal smelter or incinerator facility." Companies should ask outside contractors to explain their destruction practices and to supply a certificate of destruction when the work is complete, he said.

Regardless of method, all companies should follow a life-cycle approach to IT risk management that explicitly plans for data destruction, Heiser said. To do otherwise could leave data and organizations at risk.

E-Zine

0 comments

E-Mail

Username / Password

Password

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy